Breaking News

Pierluigi Paganini August 20, 2015
Rent a luxury car and crack its transponder to steal it later

Researchers Roel Verdult and Baris Ege, revealed that popular cars, including Ferrari and Porsche,which use Megamos Crypto transponders can be easily stolen. The level of interest on Car hacking is maximum following the recent hack of the Fiat Chrysler Jeep, news of the day is that a team or experts since 2012 is aware of the presence of security flaws […]

Pierluigi Paganini August 20, 2015
Hackers have leaked Ashley Madison dump online

The hacking crew who breached the online adultery website Ashley Madison has leaked online a dump of the company’s websites containing user data. In July, the popular online cheating site Ashley Madison has been hacked and a big amount of data was stolen by hackers who posted part of this information online as proof of […]

Pierluigi Paganini August 19, 2015
Chip-and-PIN technology has been compromised

A new report published by the popular investigator Brian Krebs show how cyber criminals have compromised chip-and-PIN technology. Recently chip-and-PIN technology started to be adopted in the US because it would improve the security for the customers, merchants and financial institutions. This is true, but the problem is that when the market pushes in one […]

Pierluigi Paganini August 19, 2015
AT&T secretly helped Spy agency, suggests new NSA leaked documents

The US National Security Agency has utilized an exceptional, decades-old association with AT&T to snoop on Internet utilization, as per recently uncovered reports spilled by Edward Snowden. The archives gave by the previous NSA foreman and checked on by The New York Times and ProPublica portrayed a “profoundly synergistic” telecom titan that showed a “great […]

Pierluigi Paganini August 19, 2015
CVE-2015-3842 – A new critical flaw threatens Android users

CVE-2015-3842 is a new flaw affecting the Android mediaserver, which can be exploited to perform attacks involving arbitrary code execution. The problems for Android users continue, a long serie of vulnerabilities has been discovered by the experts in the last weeks, Stagefright, zero-day zero-day deserialization, and Certifi-Gate are the names of some of the flaw recently […]

Pierluigi Paganini August 19, 2015
Critical Zero-Day flaw – Microsoft Pushes Emergency IE Patch

Microsoft has pushed an emergency patch to remediate a zero-day vulnerability in Internet Explorer that is actively being exploited in-the-wild. Today, August 18th, 2015, Microsoft released an emergency patch after being notified of a critical vulnerability in all supported versions of Internet Explorer. All versions of Microsoft Internet Explorer from IE7 to IE11 are affected by this zero-day vulnerability. […]

Pierluigi Paganini August 18, 2015
Windows 10 allows Microsoft to remote disable pirated software and hardware

A report revealed that Microsoft could scan PCs running Windows 10 searching for pirated games and unauthorized hardware and disable them. One thing is certain, for better or for worse, we are talking a lot about the new Microsoft operating system Windows 10. The experts mainly expressed privacy concerns around the Windows 10 OS, they […]

Pierluigi Paganini August 18, 2015
Hidden Tear Ransomware is now open Source and available on GitHub

The Turkish security researchers Utku Sen has published the first open source ransomware  for educational purposes that anyone can use. Ransomware is now open Source and available in GitHub. Ransomware is one of most dangerous cyber threats for end-users, in the recent months the number of ransomware in the wild is increased as never before. Criminal […]

Pierluigi Paganini August 18, 2015
ICS-CERT warns for 0-Day vulnerabilities in SCADA systems

The ICS-CERT has recently published six security advisories to warn organizations about a number of 0-day flaws in SCADA systems. The ICS-CERT has published six advisories to warn organizations about the presence of Zero-Day Flaws in SCADA Systems. Aditya K. Sood, security researcher at Elastica, has revealed in a talk at the Def Con 2015 conference several vulnerabilities […]

Pierluigi Paganini August 18, 2015
SS7 flaw allows hackers to spy on every conversation

By Exploiting a flaw in the SS7 protocol hackers can access every conversation and text message mobile users send from everywhere in the world. Hackers can spy on every mobile phone user wherever it is. Channel Nine’s 60 Minutes has revealed the existence of a security hole in modern telecommunication systems that could be exploited by […]